-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Uncertain syntax for wildcard subject alt name under intermediate cert with name constraints #12250
Comments
cc: @woodruffw |
@nettnikl DNS name constraints don't allow patterns like
In other words, in your case, I think you want a DNS name constraint of just |
I did the following, what change do you propose @woodruffw ?
|
Can you provide some code for us to run, it's a bit hard to guess at what the problem is without context. |
Oh, I think I see the problem: https://github.com/pyca/cryptography/blob/main/src/rust/cryptography-x509-verification/src/lib.rs#L159
|
Confirming limbo case here: C2SP/x509-limbo#385 I'll look into a fix tonight. |
You guys are gold, thanks! |
Not sure how to label this, sorry. Depending on the answer, this might be a feature request or a bug report.
I'm trying to create well formed and well behaved certificates under a custom CA + intermediate cert.
Wildcards are not meant to be used in the intermediate cert. (#8253)
But then, (how) can i achieve something like:
I'd assume the CA has to have no nameConstraints.
But what to do with the intermediate then?
Allowing
DNS:lan
leads to: Certificate is NOT Trusted: validation failed: candidates exhausted: unsatisfiable DNS name constraint: malformed SAN *.example.lanAllowing
DNS:.lan
leads to: Certificate is NOT Trusted: validation failed: candidates exhausted: malformed DNS name constraint: .lanAllowing
DNS:*.lan
leads to: permitted subtree violation (by OpenSSL during creation)Allowing
DNS:example.lan
leads to: Certificate is NOT Trusted: validation failed: candidates exhausted: unsatisfiable DNS name constraint: malformed SAN *.example.lanAllowing
DNS:example.lan
+DNS:.example.lan
leads to: Certificate is NOT Trusted: validation failed: candidates exhausted: unsatisfiable DNS name constraint: malformed SAN *.example.lanAllowing
DNS:example.lan
+DNS:*.example.lan
leads to: Certificate is NOT Trusted: validation failed: candidates exhausted: unsatisfiable DNS name constraint: malformed SAN *.example.lanAre you sure we can/want to disallow wildcards in the constraints?
The text was updated successfully, but these errors were encountered: